<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Explicitly constrained generalised predictive control strategies for power management in ambulatory wireless sensor network systems
2
Explicitly Controlling the Fair Service for Busy Web Servers
3
Explicitly isolating data and computation in high level synthesis: the role of polyhedral framework
4
Explicitly modelling relationships of risks on business architecture
5
Explicitly Parallel Regular Expressions
6
Explicitly reciprocal reduced order modeling: Laguerre-SVD versus balanced realizations
7
Explicitly solvable control problems with nonholonomic constraints
8
Explicitly typed static single-assignment form
9
Explicitness in language design
10
explICU: A web-based visualization and predictive modeling toolkit for mortality in intensive care patients
11
Expliner - Robot for inspection of transmission lines
12
Expliner — From prototype towards a practical robot for inspection of high-voltage lines
13
Explode to Explain - Illustrative Information Visualization
14
Exploded time plants for observer and control synthesis of timed condition systems
15
Exploded View Diagrams of 3D Grids
16
Exploded View Diagrams of Mathematical Surfaces
17
Exploded Views for Volume Data
18
Exploding a few myths about productivity and presenting a formula for the future
19
Exploding metal film active anode source experiments on the lion extractor ion diode
20
Exploding metal film active anode source experiments on the LION extractor ion diode
21
Exploding metallic foils and fuses: a computational modeling update
22
Exploding Plasma In Dipole Magnetic Field
23
Exploding steamboats, senate debates, and technical reports: The convergence of technology, politics, and rhetoric in the steamboat bill of 1838 [Book Review]
24
Exploding the frame: designing for wall-size computer displays
25
Exploding the Myths - the true costs of road user charging schemes
26
Exploding the Nyquist barrier misconception
27
Exploding-Wire Photon Testing of Skynet Satellite
28
Exploit adaptive modulation in UWB Powerline Communication for improved BER performance
29
Exploit analog IFA to improve specification based tests [of SC circuits]
30
Exploit asymmetric error rates of cell states to improve the performance of flash memory storage systems
31
Exploit common source-line to construct energy efficient domain wall memory based caches
32
Exploit detection techniques for STP using distributed IDS
33
Exploit Dynamic Voltage and Frequency Scaling for SoC Test Scheduling under Thermal Constraints
34
Exploit failure prediction for adaptive fault-tolerance in cluster computing
35
Exploit imbalanced cell writes to mitigate write disturbance in dense Phase Change Memory
36
Exploit Kalman filter to improve fingerprint-based indoor localization
37
Exploit Kashida Adding to Arabic e-Text for High Capacity Steganography
38
Exploit Kits: The production line of the Cybercrime economy?
39
Exploit Multiple-Domain Sparseness for HSDPA Chip Level Equalization in SDR: Algorithm and DSP Implementation
40
Exploit of online social networks with Semi-Supervised Learning
41
Exploit of Remote Monitoring and Control System for Bell Prover Device Based on Virtual Instrument
42
Exploit real-time fine-grained access patterns to partition write buffer to improve SSD performance and life-span
43
Exploit the capacity of unstable links in AODV-based ad hoc networks
44
Exploit the Parallel Paradigm
45
Exploit the scale of big data for data privacy: An efficient scheme based on distance-preserving artificial noise and secret matrix transform
46
Exploit TIVs to Find Faster Paths
47
ExPLoIT: Exploiting Past Location Information and Transitivity for positioning in mobile sensor networks
48
Exploitability analysis using predictive cybersecurity framework
49
Exploitability of vehicle related sensor data in cooperative systems
50
Exploitable fibre nonlinearity in coupled-cavity colour centre lasers
51
Exploitation and Exploration Balanced Hierarchical Summary for Landmark Images
52
Exploitation and extension of the region-of-interest coding functionalities in JPEG2000
53
Exploitation and peacekeeping: introducing more sophisticated interactions to the iterated prisoner´s dilemma
54
Exploitation And Protection Of Marine Resources In The Baltic Region
55
Exploitation and Utilization Strategy of Coal Resources in Hebei Province
56
Exploitation by Informed Exploration between Isolated Operatives for information-theoretic data harvesting
57
Exploitation fine-grain parallelism in a combinator-based functional system
58
Exploitation method for functional product requirements - An integrated function oriented approach
59
Exploitation of "Big Data": The experience feedback of the french military health service on sanitary data
60
Exploitation of 3D images for face authentication under pose and illumination variations
61
Exploitation of 3-D printing technique in design and prototype of an eyeglass frame for Philippine Eye Research Institute
62
Exploitation of 3D Stereotactic Surface Projection for automated classification of Alzheimer´s disease according to dementia levels
63
Exploitation of 3D video technologies
64
Exploitation of a compact, cost-effective EEG module for plug-and-play, SSVEP-based BCI
65
Exploitation of a dual-band cell phone antenna for near-field WPT
66
Exploitation of a new iron B-H phenomenon for the standstill position detection of PM motors
67
Exploitation of a priori information for tracking maritime intermittent data sources
68
Exploitation of a Pulsed Laser to Explore Transient Effects on Semiconductor Devices
69
Exploitation of AATSR land surface temperature
70
Exploitation of accelerometer for rehabilitation process
71
Exploitation of active load-pull and DLUT models in MMIC design
72
Exploitation of advanced control techniques in power generation
73
Exploitation of aeroelastic effects for drift reduction in an all-polymer air flow sensor
74
Exploitation of ALOS-PALSAR SAR full-polarimetry data to the mapping of an African region
75
EXPLOITation of an ATM testbed for broadband experiments and applications
76
Exploitation of an opponent´s imperfect information in a stochastic game with autonomous vehicle application
77
Exploitation of angular signatures to calibrate geostationary satellite solar channels
78
Exploitation of auctions for outsourcing security-critical projects
79
Exploitation of bistatic doppler measurements in multistatic tracking
80
Exploitation of C band VSATs
81
Exploitation of capacitive coupling at UHF for remote sensing in a kW WPT system
82
Exploitation of capacitive micromachined transducers for nonlinear ultrasound imaging
83
Exploitation of CBERS-02B as auxiliary data in recovering the Landsat7 ETM+ SLC-off image
84
Exploitation of ceramics material resources for sustainable development in selected parts of Nigeria
85
Exploitation of channel division multiple access diversity in UWB MB-OFDM system
86
Exploitation of Chlorella Pyrenoidosa´s Biomass Energy by Aquiculture Wastewater
87
Exploitation of coarse grid for electromagnetic optimization
88
Exploitation of context classification for parallel pixel coding in JPEG-LS
89
Exploitation Of Contour Information From Multi-echo MR Slices
90
Exploitation of control parallelism in data parallel algorithms
91
Exploitation of Cosmo SkyMed SAR images for maritime traffic surveillance
92
Exploitation of Cosmo-Skymed image time series for snow monitoring in alpine regions
93
Exploitation of COSMO-SkyMed system for detection of ships responsible for oil spills
94
Exploitation of Cross-References between Terminological Resources within the CALBC Context
95
Exploitation of cyclostationarity for identifying nonlinear Volterra systems by input-output noisy measurements
96
Exploitation of cyclostationarity for identifying the Volterra kernels of nonlinear systems
97
Exploitation of Cyclostationarity Using Fractional Lower-Order Cyclic Statistics
98
Exploitation of database meta-data in assisting database interoperation
99
Exploitation of different types of locality for Web caches
100
Exploitation of disk cache for VOD services in network-attached storage systems
101
Exploitation of Diversity in MC-CDMA Systems
102
Exploitation of dominant scatterers for sidelobe suppression in radar tomography
103
Exploitation of DWDM for optical packet switching with quality of service guarantees
104
Exploitation of dynamic and partial hardware reconfiguration for on-line power/performance optimization
105
Exploitation of Dynamic Communication Patterns through Static Analysis
106
Exploitation of Electric-Drive Vehicles in Electricity Markets
107
Exploitation of electromagnetic radiation properties for medical diagnostic
108
Exploitation of elevation angle control for a 2-D HF skywave radar
109
Exploitation of enhanced fluorescence via cross coupling principles towards the design of an optical integrated thin-film sensor for nanotechnology and biomedical applications
110
Exploitation of enhanced fluorescence via cross-coupling principles toward the design of an optical integrated thin-film sensor for nanotechnology and biomedical applications
111
Exploitation of extra diversity in UWB MB-OFDM system
112
Exploitation of First-Order Cyclostationarity for Joint Signal Detection and Classification in Cognitive Radio
113
Exploitation of games and virtual environments for e-learning
114
Exploitation of graphene as HIS and RIS for devices in the MW and THz frequency ranges
115
Exploitation of Hadoop framework for point cloud geographic data storage system
116
Exploitation of heterogeneity in distributed sensing: An active-passive networked multiagent systems approach
117
Exploitation of Hierarchy in Analyses of Integrated Circuit Artwork
118
Exploitation of High Performance Computing in the FLAME Agent-Based Simulation Framework
119
Exploitation of higher-order cyclostationarity for weak-signal detection and time-delay estimation
120
Exploitation of human bio-signals for physical exercise in mobile applications
121
Exploitation of hyperspectral data for infrastructures status assessment: Preliminary results of the istimes test bed
122
Exploitation of hyperspectral imagery and lidar for landuse classification
123
Exploitation of induction machine´s high-frequency behavior for online insulation monitoring
124
Exploitation of Information Centric Networking principles in satellite networks
125
Exploitation of Initial Conditions to Achieve Flux Gain and Nondestructive Readout in Balanced Magnetic Circuits
126
Exploitation of instruction-level parallelism for optimal loop scheduling
127
Exploitation of inter-color correlation for color image demosaicking
128
Exploitation of Interframe Redundancy for Real-Time Volumetric Reconstruction of Arbitrary Shapes
129
Exploitation of intracell macrodiversity in mobile radio systems by deployment of remote antennas
130
Exploitation of ionospheric Faraday rotation to perform radar astronomical polarization measurements
131
Exploitation of IPR (intellectual property rights)
132
Exploitation of iron B-H local hysteresis for the rotor position detection of a PM motor
133
Exploitation of known short and long symbols for carrier frequency offset estimation in OFDM wireless LAN systems
134
Exploitation of label relationship in multi-label learning
135
Exploitation of Landsat imagery and ancillary data for battlespace characterization
136
Exploitation of Linear Frequency Modulated Continuous Waveform (LFMCW) for Frequency Diverse Arrays
137
Exploitation of low-cost microcontroller potentialities to develop fully digital rotor flux oriented induction motor drives
138
Exploitation of maritime domain ontologies for anomaly detection and threat analysis
139
Exploitation of massive numbers of simple events
140
Exploitation of meta knowledge for learning visual concepts
141
Exploitation of MIMO techniques for reliable HF communication
142
Exploitation of minimum risk system based on Artificial Neural Network
143
Exploitation of MNT in medical diagnostics
144
Exploitation of Mobile Access to Context-Based Information in Cultural Heritage Fruition
145
Exploitation of modularity in the JET tokamak Vertical Stabilization system
146
Exploitation of multi-camera configurations for visual surveillance
147
Exploitation of multi-channel communications in industrial wireless sensor applications: Avoiding interference and enabling coexistence
148
Exploitation of multi-frequency excitation for contrast agent imaging
149
Exploitation of Multiple Hyperspace Dimensions to Realize Coexistence Optimized Wireless Automation Systems
150
Exploitation of multiple sensor arrays in electronic nose
151
Exploitation of multi-temporal SAR and EO satellite imagery for geospatial intelligence
152
Exploitation of multiuser diversity in spatial and time domain by opportunistic communication system using an Omni-directional antenna at BS
153
Exploitation of Multivalued Type Proximity for Symbolic Feature Selection
154
Exploitation of natural image statistics by biological vision systems: 1/f2 power spectra and self-similar bandpass decompositions
155
Exploitation of Nonlinear Effects for Enhancement of the Sensing Performance of Resonant Sensors
156
Exploitation of nonradiating modes in asymmetric coplanar strip folded dipoles
157
Exploitation of ontological resources for scientific literature analysis: Searching genes and related diseases
158
Exploitation of OpenFlow in wireless sensor networks
159
Exploitation of operation-level parallelism in a processor of the CRAY X-MP
160
Exploitation of optical fibre capacity in long links
161
Exploitation of Parallel Search Space Evaluation with FPGAs in Combinatorial Problems: The Eternity II Case
162
Exploitation of parallelism for applications with an input data stream: optimal resource-throughput tradeoffs
163
Exploitation of parallelism in group probing for testing massively parallel processing systems
164
Exploitation Of Parallelism In Vlsi Array Testing
165
Exploitation of passive RFID technology for wireless read-out of temperature sensors
166
Exploitation of patient avatars towards stratified medicine through the development of in silico clinical trials approaches
167
Exploitation of periodicity in logic simulation of synchronous circuits
168
Exploitation of personal I&C technologies for an optimal deployment strategy of ITS products and services
169
Exploitation of Physical Constraints for Reliable Social Sensing
170
Exploitation of polarimetry in short range 3D UWB-radar object imaging
171
Exploitation of Polarization in Back-Illuminated AlGaN Avalanche Photodiodes
172
Exploitation of pre-sortedness for sorting in query processing: the TempTris-algorithm for UB-trees
173
Exploitation of Q/V-band for future broadband telecommunication satellites
174
Exploitation of Quasi-Orthogonal Space Time Block Codes in Virtual Antenna Arrays: Part I - Theoretical Capacity and throughput Gains
175
Exploitation of Quasi-Orthogonal Space Time Block Codes in Virtual Antenna Arrays: Part II Monte Carlo-Based throughput Evaluation
176
Exploitation of radar Doppler signatures for gait analysis
177
Exploitation of realistic computational anthropomorphic phantoms for the optimization of nuclear imaging acquisition and processing protocols
178
Exploitation of redundancy for throughput increase in a high speed LAN
179
Exploitation of Regression Line Potentiality to Track the Object through Color Optical Flow
180
Exploitation of renewable power sources for local consumers’ reservation
181
Exploitation of scattered context grammars to model VLIW instruction constraints
182
Exploitation of Ship Scattering in Polarimetric SAR for an Improved Classification Under High Clutter Conditions
183
Exploitation of signal structure in array-based blind copy and copy-aided DF systems
184
Exploitation of social semantic technology for software development team configuration
185
Exploitation of source nonstationarity in underdetermined blind source separation with advanced clustering techniques
186
Exploitation of space diversity using SCM to increase the data rate by MIMO technology and analysis of system´s performance on the basis of BER
187
Exploitation of sparse properties of support vector machines in image compression
188
Exploitation of spatial channel model for antenna array synthesis
189
Exploitation of spatial diversity in a novel cooperative spectrum sharing method based on PAM and modified PAM modulation
190
Exploitation of spectral correlation in cyclostationary signals
191
Exploitation of spectral redundancy in cyclostationary signals
192
Exploitation of spectral variance to improve robustness in speech recognition
193
Exploitation of spline-based geometries for the time-domain synthesis of UWB antennas
194
Exploitation of spurious coupling in metal enclosures for oscillator design
195
Exploitation of SRTM DEM in InSAR phase unwrapping problem
196
Exploitation of SRTM DEM in InSAR processing and its application to phase unwrapping problem
197
Exploitation of stream processing on graphical Processors in Inertial Navigation
198
Exploitation of structured gating connections for the normalization of a visual pattern
199
Exploitation of surface albedo derived from the Meteosat data to characterize land surface changes
200
Exploitation of symmetries in the impedance matrix for moment-method analysis of arbitrary frequency-selective surfaces
201
Exploitation of synchronous digital hierarchy features to provide multidestination satellite communications
202
Exploitation of temporal persistence for accuracy improvement in primary user detection
203
Exploitation of temporal redundancy for lossless video coding
204
Exploitation of the 100ߝ1000 GHz frequency range
205
Exploitation of the additive component of the polarimetric noise model for speckle filtering
206
Exploitation of the COSMO-SkyMed SAR System for GMTI Applications
207
Exploitation of the digital elevation models in arid and semi-arid areas.selective detection of the topological shapes using different approaches
208
Exploitation of the European Digital upper Atmospheric Server (DIAS) for radio systems applications
209
Exploitation of the External JTAG Interface for Internally Controlled Configuration Readback and Self-Reconfiguration of Spartan 3 FPGAs
210
Exploitation of the geometrical symmetry in the boundary element method with the group representation theory
211
Exploitation of the HVS features for the enhancement of image watermarking techniques
212
Exploitation of the Impedance and Characteristics of the Human Arm in the Design of Haptic Interfaces
213
Exploitation of the integrated digital processing and analysis of the ELETTRA/SLS Transverse Multi-Bunch Feedback System
214
Exploitation of the multifractality spectrum for surface discrimination
215
Exploitation of the Network Teaching Platform on DSP Chip Technology
216
Exploitation of the optical tunneling effect to sense AFM´s microlever displacements
217
Exploitation of the phasor approach for closed-form solution of the Van der Pol´s oscillator and sinusoidal oscillators with high-order nonlinearity
218
Exploitation of the recommendation systems in the calculation of the learning path
219
Exploitation of the UC-PBG structure as ground plane to enhance microstrip antenna bandwidth
220
Exploitation of the unused resources for e-learning using Data Grid
221
Exploitation of the W-band for high capacity satellite communications
222
Exploitation of the whole electromagnetic spectrum in art conservation studies
223
Exploitation of Time-Variations in Wireless Channels using Two Different CDMA Systems
224
Exploitation of track accuracy information in fusion technologies for radar target classification using Dempster-Shafer Rules
225
Exploitation of Transmultiplexers in Telecommunication Networks
226
Exploitation of UML 2.0 - Based Platform Service Model and SystemC Workload Simulation in MPEG-4 Partitioning
227
Exploitation of unlabeled sequences in hidden Markov models
228
Exploitation of unutilized land under ecological limit condition in Ji´nan city
229
Exploitation of user profile in the information retrieval based on Bayesian approach
230
Exploitation of volume inversion in optimal DG MOSFET design
231
Exploitation of X-ray technology for the detection of contraband-aviation security applications
232
Exploitation on the Knowledge Transfer of the Time-Cost Optimization
233
Exploitation on the shool affairs workflow system
234
Exploitation selection of alpha parameter in Gravitational Search Algorithm of PID controller for computational time analysis
235
Exploitation stresses and challenges in diagnostics of electrical industrial equipment
236
Exploitation the waste energy in hybrid cars to improve the efficiency of solar cell panel as an auxiliary power supply
237
Exploitation vs. exploration: Choosing keywords for search-based advertising services
238
Exploitation/exploration learning for MDP environment
239
Exploit-based Analysis of Attack Models
240
Exploiting "The World is Flat" Syndrome in Digital Photo Collections for Contextual Metadata
241
Exploiting “Architecture for Verification” to streamline the verification process
242
Exploiting A Priori Time Constant Ratio Information in Difference Equation Two-Thermocouple Sensor Characterization
243
Exploiting 0.8-micron ASIC libraries from different venders
244
Exploiting 162-Nanosecond End-to-End Communication Latency on Anton
245
Exploiting 2-1/2 D TWT simulations to maximize the efficiency of the Hughes 8815HR TWT
246
Exploiting 2nd-order statistics in Bayesian signal reconstruction problems
247
Exploiting 3D faces in biometric forensic recognition
248
Exploiting 3D geometric primitives for multicamera pedestrian detection
249
Exploiting 3D printed substrate for microfluidic SIW sensor
250
Exploiting 3D semantic scene priors for online traffic light interpretation
251
Exploiting 3D Spatial Continuity for Robust Automatic Horizon Matching across Faults
252
Exploiting 3D Structure for Scalable Routing in MANETs
253
Exploiting 3D virtual environments for supporting role playing games
254
Exploiting 4G mobile user cooperation for energy conservation: challenges and opportunities
255
Exploiting 70-90 GHz band for efficient gigabit wireless communications
256
Exploiting a ‘gaze-Lombard effect’ to improve ASR performance in acoustically noisy settings
257
Exploiting a clustering mechanism for power saving in ad hoc networks: Performance evaluation
258
Exploiting a coevolutionary approach to concurrently select training instances and learn rule bases of Mamdani fuzzy systems
259
Exploiting a conceptual representation to integrate business and technology strategies
260
Exploiting a constellation of narrowband RF sensors to detect and track moving targets
261
Exploiting a fast and simple ECC for scaling supply voltage in level-1 caches
262
Exploiting a latchup circuit via commercial CMOS technologies
263
Exploiting a meeting channel to interconnect 802.15.4-compliant mobile entities: discovery and association phases
264
Exploiting a micro Pirani gauge for multifonction
265
Exploiting a New Domain About Urban Plan Promoting Employment
266
Exploiting a New Interpretability Index in the Multi-Objective Evolutionary Learning of Mamdani Fuzzy Rule-Based Systems
267
Exploiting a new level of DLP in multimedia applications
268
Exploiting a prioritized MAC protocol to efficiently compute interpolations
269
Exploiting a Prioritized MAC Protocol to Efficiently Compute Min and Max in Multihop Networks
270
Exploiting a ring-based MIMD multicomputer for numerical problems
271
Exploiting a scene calibration mechanism for depth estimation
272
Exploiting a search engine to develop more flexible Web agents
273
Exploiting a three-objective evolutionary algorithm for generating Mamdani fuzzy rule-based systems
274
Exploiting a weak consistency to implement distributed tuple space
275
Exploiting abstraction, learning from random simulation, and SVM classification for efficient dynamic prediction of software health problems
276
Exploiting accelerometers to improve movement classification for prosthetics
277
Exploiting Access Control Information in User Profiles to Reconfigure User Equipment
278
Exploiting Access Control Information in User Profiles to Reconfigure User Equipment
279
Exploiting Acoustic and Syntactic Features for Automatic Prosody Labeling in a Maximum Entropy Framework
280
Exploiting acoustic feature correlations by joint neural vector quantizer design in a discrete HMM system
281
Exploiting Active Sub-Areas for Multi-Copy Routing in VDTNs
282
Exploiting active-learning strategies for annotating prosodic events with limited labeled data
283
Exploiting Actuator Mobility for Energy-Efficient Data Collection in Delay-Tolerant Wireless Sensor Networks
284
Exploiting ad hoc meshes in IP based access networks
285
Exploiting Adaptive and Collaborative AUV Autonomy for Detection and Characterization of Internal Waves
286
Exploiting adaptive beamforming for compressive measurements
287
Exploiting Adaptive Mechanisms to Enhance Functionalities: ABC4All - A Case Study
288
Exploiting Adaptive Multi-interface Selection to Improve QoS and Cost-Efficiency of Mobile Video Streaming
289
Exploiting Adaptive Window Techniques to Reduce TCP Congestion in Mobile Peer Networks
290
Exploiting Additional Active Time of WiFi Interface to Reduce Power Consumption of Smartphones
291
Exploiting additional actuators and sensors for nano-positioning robust motion control
292
Exploiting Additional Context for Graph-Based Tag Recommendations in Folksonomy Systems
293
Exploiting Additional Dimensions as Virtual Items on Top-N Recommender Systems
294
Exploiting addresses correlation to maximize lifetime of IPv6 cluster-based WSNs
295
Exploiting ADLs to specify architectural styles induced by middleware infrastructures
296
Exploiting ADS-arrays for the synthesis of MIMO systems
297
Exploiting advanced composite materials for lightweight shipboard SHF satellite communication antennas
298
Exploiting advanced fault localization methods for yield & reliability learning on SoCs
299
Exploiting advanced video analysis technologies for a smart home monitoring platform for epileptic patients: Technological and legal preconditions
300
Exploiting affinity propagation for automatic acquisition of domain concept in ontology learning
301
Exploiting Affinity Propagation for Energy-Efficient Information Discovery in Sensor Networks
302
Exploiting affordance symmetries for task reproduction planning
303
Exploiting agent and database technologies for biological data collection
304
Exploiting agent mobility for large-scale network monitoring
305
Exploiting agents and SIP for smart context level agreements
306
Exploiting Algebraic and Structural Complexity for Single Snapshot Computed Tomography Hyperspectral Imaging Systems
307
Exploiting algebraic structure in cross-layer design
308
Exploiting Alternative Paths in MHWNs: A Source-Based QoS Routing Approach
309
Exploiting altruism in social networks for friend-to-friend malware detection
310
Exploiting ambient information into reactive agent architectures
311
Exploiting Ambient Light Sensor for Authentication on Wearable Devices
312
Exploiting amplitude spatial coherence for multi-target particle filter in Track-Before-Detect
313
Exploiting AMR-WB Audio Bandwidth Extension for Quality and Capacity Increase
314
Exploiting an elastic 2-tiered cloud architecture for rich mobile applications
315
Exploiting an enterprise model during systems´ requirements capture and analysis
316
Exploiting an event based state estimator in presence of sparse measurements in video analytics
317
Exploiting an Event-Based Communication Infrastructure for Rule Based Alerting in Sensor Webs
318
Exploiting an event-based infrastructure to develop complex distributed systems
319
Exploiting an event-based system to develop a distributed e-commerce infrastructure
320
Exploiting an I/OMMU vulnerability
321
Exploiting an I-IP for both Test and Silicon Debug of Microprocessor Cores
322
Exploiting an I-IP for in-field SoC test
323
Exploiting an infrastructure IP to reduce memory diagnosis costs in SoCs
324
Exploiting an infrastructure-intellectual property for systems-on-chip test, diagnosis and silicon debug
325
Exploiting an interplay between norms to analyze scalar quantization schemes
326
Exploiting an MRI derived arterial input function to improve the PET simultaneous estimation method: Validation of assumptions
327
Exploiting an Optimal User Association Strategy for Interference Management in HetNets
328
Exploiting Analog and Digital Reconfiguration for Smart Sensor Interfacing
329
Exploiting anarchy in networks: a game-theoretic approach to combining fairness and throughput
330
Exploiting anatomical information for PET image enhancement: A phantom experiment for algorithm validation
331
Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks
332
Exploiting and Evaluating MapReduce for Large-Scale Graph Mining
333
Exploiting and Handling Delayed Measurements in Sensor Systems
334
Exploiting and modeling local 3D structure for predicting object locations
335
Exploiting angular momentum to enhance bipedal center-of-mass control
336
Exploiting Annotated Video to Support Dance Education
337
Exploiting Annotations to Test Break-off Branches
338
Exploiting Antenna Selection Gain in IEEE 802.16 Broadband Wireless Access Systems
339
Exploiting Application Data-Parallelism on Dynamically Reconfigurable Architectures: Placement and Architectural Considerations
340
Exploiting application dynamism and cloud elasticity for continuous dataflows
341
Exploiting application locality to design fast, low power, low complexity neural classifiers
342
Exploiting application locality to design low-complexity, highly performing, and power-aware embedded classifiers
343
Exploiting application resiliency for energy-efficient and adequately-reliable operation
344
Exploiting Application Semantics in Monitoring Real-Time Data Streams
345
Exploiting application tunability for efficient, predictable parallel resource management
346
Exploiting Application/System-Dependent Ambient Temperature for Accurate Microarchitectural Simulation
347
Exploiting application-dependent ambient temperature for accurate architectural simulation
348
Exploiting application-layer strategies for improving BitTorrent performance over MANETs
349
Exploiting approximate transitivity of trust
350
Exploiting approximate value locality for data synchronization on multi-core processors
351
Exploiting Arabic Wikipedia for automatic ontology generation: A proposed approach
352
Exploiting arc splines for digital maps
353
Exploiting Architectural Similarities and Mode Sequencing in Joint Cost Optimization of Multi-mode FIR Filters
354
Exploiting architectural style to develop a family of applications
355
Exploiting architecture description language for diverse IP synthesis in heterogeneous MPSoC
356
Exploiting area/delay tradeoffs in high-level synthesis
357
Exploiting arm posture synergies in activities of daily living to control the wrist rotation in upper limb prostheses: A feasibility study
358
Exploiting array motion for augmentation of co-prime arrays
359
Exploiting arrays with multiple invariances using MUSIC and MODE
360
Exploiting Artificial Immune systems to detect unknown DoS attacks in real-time
361
Exploiting asymmetric CPU performance for fast startup of subsystem in mobile smart devices
362
Exploiting asymmetry in a capacitively loaded strongly coupled dipole array
363
Exploiting asymmetry in Booth-encoded multipliers for reduced energy multiplication
364
Exploiting Asynchronous Amplify-and-Forward Relays to Enhance the Performance of IEEE 802.11 Networks
365
Exploiting asynchronous invariance for resistant encrypted watermark embedded in Radon field
366
Exploiting asynchrony in DS-CDMA systems through interference avoidance
367
Exploiting Attribute Redundancy in Extracting Open Source Forge Websites
368
Exploiting Attributed Type Graphs to Generate Metamodel Instances Using an SMT Solver
369
Exploiting Audio-Visual Cross-Modal Interaction to Reduce Computational Requirements in Interactive Environments
370
Exploiting Author-Designed Domain-Specific Descriptive Markup Languages in the Production of Learning Content
371
Exploiting automatic analysis of e-commerce protocols
372
Exploiting automatic image segmentation to human detection and depth estimation
373
Exploiting autonomous system information in structured peer-to-peer networks
374
Exploiting Backbone Routing Redundancy in Industrial Wireless Systems
375
Exploiting bacteria swarms for pollution mapping
376
Exploiting bacterial properties for multi-hop nanonetworks
377
Exploiting bacterial swarms for optimal coverage of dynamic pollutant profiles
378
Exploiting Ballistic Electrons in a Uni-Traveling Carrier Traveling Wave Photo-Detector for Efficient Generation of Sub-MM Waves
379
Exploiting Barriers to Optimize Power Consumption of CMPs
380
Exploiting Base Station Caching in MIMO Cellular Networks: Opportunistic Cooperation for Video Streaming
381
Exploiting basic block value locality with block reuse
382
Exploiting Bayesian Belief Network for Adaptive IP-Reuse Decision
383
Exploiting Behavior Models for Availability Analysis of Interactive Systems
384
Exploiting biclustering for missing value estimation in DNA microarray data
385
Exploiting big data in time series forecasting: A cross-sectional approach
386
Exploiting Binary Abstractions in Deciphering Gene Interactions
387
Exploiting binary functionality in quaternary look-up tables for increased functional density in multiple-valued logic FPGAs
388
Exploiting binary Markov channels with unknown parameters in turbo decoding
389
Exploiting binary translation for fast ASIP design space exploration on FPGAs
390
Exploiting Binocular Rivalry: Presenting Different Contents on Dominant and Non-dominant Eyes
391
Exploiting biometric measurements for prediction of emotional state: A preliminary study for healthcare applications using keystroke analysis
392
Exploiting Biosafety Examination System Based on Flex
393
Exploiting BIST approach for two-pattern testing
394
Exploiting bit level concurrency in real-time geometric feature extractions
395
Exploiting bit-depth scaling for quality-scalable energy efficient display processing
396
Exploiting bitemporal schema versions for managing an historical medical data warehouse: a case study
397
Exploiting Bit-Level Delay Calculations to Soften Read-After-Write Dependences in Behavioral Synthesis
398
Exploiting bit-level parallelism in Boolean matrix operations for graph analysis
399
Exploiting bit-level parallelism in GPGPUs: A case study on KeeLoq exhaustive key search attack
400
Exploiting block sparsity for joint mitigation of asynchronous NBI and IN in hybrid powerline-wireless communications
401
Exploiting Bluetooth on Android mobile devices for home security application
402
Exploiting body biasing for leakage reduction: A case study
403
Exploiting body dynamics for controlling a running quadruped robot
404
Exploiting Bolivia´s natural gas resources
405
Exploiting bondwire parasitic impedance in the design of a 1.6 GHz narrow-band CMOS low noise amplifier
406
Exploiting both intra-quadtree and inter-spatial structures for multi-contrast MRI
407
Exploiting both local and global constraints for multi-span statistical language modeling
408
Exploiting both statistical and stale CSIT for linear precoding in MISO broadcast channel
409
Exploiting buffer overflows over Bluetooth: the BluePass tool
410
Exploiting buffers in cognitive multi-relay systems for delay-sensitive applications
411
Exploiting Bulk Agent Approach for Conflict Resolution in Multi Agent Systems
412
Exploiting burst transmission and partial correlation for reliable wake-up signaling in Radio-On-Demand WLANs
413
Exploiting Bus Level and Bit Level Inactivity for Preventing Wire Degradation due to Electromigration
414
Exploiting cache conflicts to reduce radiation sensitivity of operating systems on embedded systems
415
Exploiting cache in multimedia
416
Exploiting caching for realtime multimedia systems
417
Exploiting Calibration-Induced Artifacts in Lossless Compression of Hyperspectral Imagery
418
Exploiting capability constraints to solve global two-dimensional path planning problems
419
Exploiting capacitance in high-performance computer systems
420
Exploiting capture effect in frameless ALOHA for massive wireless random access
421
Exploiting capture effect to provide service differentiation in wireless LANs
422
Exploiting Cardinality Encodings in Parallel Maximum Satisfiability
423
Exploiting carrier Ethernet to deliver profitable new services
424
Exploiting causal structure in the refined diagnosis of condition systems
425
Exploiting causality and communication patterns in network data analysis
426
Exploiting Causality for Structured Models Using Bond Graphs
427
Exploiting causes and effects of wireless link correlation for better performance
428
Exploiting celebrity to produce delight in multimedia tools
429
Exploiting Cell Dormancy and Load Balancing in LTE HetNets: Optimizing the Proportional Fairness Utility
430
Exploiting cell dormancy and load balancing in LTE HetNets: Optimizing the proportional fairness utility
431
Exploiting Cellular Networks for Road Traffic Estimation: A Survey and a Research Roadmap
432
Exploiting Change Blindness for Image Compression
433
Exploiting change blindness to expand walkable space in a virtual environment
434
Exploiting Channel Angular Domain Information for Precoder Design in Distributed Antenna Systems
435
Exploiting channel correlation and PU traffic memory for opportunistic spectrum scheduling
436
Exploiting Channel Correlations - Simple Interference Alignment Schemes with No CSIT
437
Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness
438
Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities
439
Exploiting channel memory for joint estimation and scheduling in downlink networks
440
Exploiting Channel Memory for Joint Estimation and Scheduling in Downlink Networks—a Whittle’s Indexability Analysis
441
Exploiting channel memory for multi-user wireless scheduling without channel measurement: Capacity regions and algorithms
442
Exploiting channel memory for wireless scheduling with limited channel probing: An asymptotic study
443
Exploiting Channel Periodicity in Body Sensor Networks
444
Exploiting channel state information in slotted ALOHA with SINR capture
445
Exploiting channel statistics to improve the average sum rate in OFDMA systems
446
Exploiting Channel Time Selectivity in Pilot-Aided Alamouti STBC Systems
447
Exploiting channel-aware reputation system against selective forwarding attacks in WSNs
448
Exploiting Chaos for Computation
449
Exploiting chaos to suppress spurious tones in general double-loop ΣΔ modulators
450
Exploiting characteristic mode theory for the design of a chipless RFID tag
451
Exploiting characteristics of slow fading channels in OFDMA scheduling
452
Exploiting choice in resizable cache design to optimize deep-submicron processor energy-delay
453
Exploiting Choice: Instruction Fetch and Issue on an Implementable Simultaneous Multithreading Processor
454
Exploiting chrominance planes similarity on listless quadtree coders
455
Exploiting Circuit Duality to Speed up SAT
456
Exploiting circuit emulation for fast hardness evaluation
457
Exploiting circuit instability to achieve wideband linear amplification
458
Exploiting Circuit Reconvergence through Static Learning in CNF SAT Solvers
459
Exploiting Class Bias for Discovery of Topical Experts in Social Media
460
Exploiting Class Hierarchies for Knowledge Transfer in Hyperspectral Data
461
Exploiting Classes in Modeling and Display Software
462
Exploiting Classes of Virtual Machines for Scalable IaaS Cloud Management
463
Exploiting clause boundary information as features for Chinese functional chunk parsing
464
Exploiting Click Constraints and Multi-view Features for Image Re-ranking
465
Exploiting client bandwidth for more efficient video broadcast
466
Exploiting client cache: a scalable and efficient approach to build large Web cache
467
Exploiting client caches: an approach to building large Web caches
468
Exploiting Client-Side Collected Measurements to Perform QoS Assessment of IaaS
469
Exploiting clock skew scheduling for FPGA
470
Exploiting Close-to-the-Sensor Multipath Reflections Using a Human-Hearing-Inspired Model
471
Exploiting cloud computing — A proposed methodology for generating new business
472
Exploiting Cloud Computing for Algorithm Development
473
Exploiting Cloud Computing for enabling distributed testing of complex systems: The SELEX-SI roadmap
474
Exploiting cloud computing for power system analysis
475
Exploiting cloud computing in the multi-physics design and optimisation of electromagnetic devices
476
Exploiting Cloud Utility Models for Profit and Ruin
477
Exploiting cluster multicast for P2P streaming application in cellular system
478
Exploiting Clustering and Cross-Layer Design Approaches for Data Caching in MANETs
479
Exploiting clustering and stereo information in label propagation on facial images
480
Exploiting clustering in inverted file compression
481
Exploiting clusters for complete resource collection in biologically-inspired robot swarms
482
Exploiting clutter: Negative information for enhanced extended object tracking
483
Exploiting CMOS Manufacturing to Reduce Tuning Requirements for Resonant Optical Devices
484
Exploiting CMOS reverse interconnect scaling in multigigahertz amplifier and oscillator design
485
Exploiting CMOS short-channel effects for yield enhancement in analogue/RF design
486
Exploiting CMOS Technology to Enhance the Performance of ISFET Sensors
487
Exploiting coalition in co-evolutionary learning
488
Exploiting coarse grained parallelism in database applications
489
Exploiting coarse-grain verification parallelism for power-efficient fault tolerance
490
Exploiting Coarse-Grained Parallelism in B+ Tree Searches on an APU
491
Exploiting coarse-grained parallelism to accelerate protein motif finding with a network processor
492
Exploiting CoBTx-Net to Verify the Reliability of Collaborative Business Transactions
493
Exploiting code mobility for dynamic binary obfuscation
494
Exploiting Codon-Triplets Association for Genome Primary Structure Analysis
495
Exploiting co-evolution and a modified island model to climb the Core War hill
496
Exploiting cofactoring for efficient FSM symbolic traversal based on the transition relation
497
Exploiting cognitive cyclostationary noise subspace for noncognitive spectrum sensing
498
Exploiting cognitive radios in tactical point to multipoint communications
499
Exploiting coherence for multiprocessor ray tracing
500
Exploiting coherent light-matter interactions in semiconductor quantum dot — Cavity systems
501
Exploiting coherent multipath for mainbeam jammer suppression
502
Exploiting cohorts information in multibiometric identification systems via graph-based fusion
503
Exploiting Collection Level for Improving Assisted Handwritten Word Transcription of Historical Documents
504
Exploiting collective intelligence for asynchronous collaborative search
505
Exploiting collective knowledge in an image folksonomy for semantic-based near-duplicate video detection
506
Exploiting Collective Spontaneous Mobility to Improve Location Prediction of Mobile Phone Users
507
Exploiting collision information in probabilistic roadmap planning
508
Exploiting co-location history for efficient service selection in ubiquitous computing systems
509
Exploiting Color Constancy for Compensating Projected Images on Non-white Light Projection Screen
510
Exploiting color SIFT features for 2D ear recognition
511
Exploiting Color Strength to Improve Color Correction
512
Exploiting color-depth image correlation to improve depth map compression
513
Exploiting Combinatorial Redundancy for Offset Calibration in Flash ADCs
514
Exploiting Combined Multi-level Model for Document Sentiment Analysis
515
Exploiting commercial cellular networks for nano-satellite communications
516
Exploiting commercial DBS technologies to provide a military Global Broadcast Service (GBS)
517
Exploiting commercial technology to increase tactical radio performance: digital radio design
518
Exploiting Common Mode signals for FEXT cancellation in upstream VDSL
519
Exploiting Common Object Usage in Test Case Generation
520
Exploiting common randomness: A resource for network secrecy
521
Exploiting Common Subexpressions for Cloud Query Processing
522
Exploiting communication complexity for Boolean matching
523
Exploiting communication complexity for multilevel logic synthesis
524
Exploiting Communication Concurrency for Efficient Deadlock Free Routing in Reconfigurable NoC Platforms
525
Exploiting communication latency hiding for parallel network computing: model and analysis
526
Exploiting Communities for Enhancing Lookup Performance in Structured P2P Systems
527
Exploiting compartmental models of solute clearance in haemodialysis
528
Exploiting compiler-generated schedules for energy savings in high-performance processors
529
Exploiting complementary aspects of phonological features in automatic speech recognition
530
Exploiting complexity in evolutionary search using neural networks
531
Exploiting component/event-level parallelism in concurrent fault and design error simulation
532
Exploiting compressed block size as an indicator of future reuse
533
Exploiting compressive sensing for non linear inverse scattering
534
Exploiting compressive sensing in microwave tomography and inverse scattering
535
Exploiting compressive sensing theory in the design of sparse arrays
536
Exploiting Computational Resources in Distributed Heterogeneous Platforms
537
Exploiting Computing Power on Graphics Processing Unit
538
Exploiting Computing Technologies in the Follow-Up of Quran Projects
539
Exploiting Concept Association to Boost Multimedia Semantic Concept Detection
540
Exploiting Concept Mapping in a Semantic Web Environment
541
Exploiting concurrency among tasks in partitionable parallel processing systems
542
Exploiting Concurrency for Efficient Dissemination in Wireless Sensor Networks
543
Exploiting concurrency for efficient dissemination in Wireless Sensor Networks
544
Exploiting Concurrency for the ESB Architecture
545
Exploiting Concurrency in a DBMS Implementation for Production Systems
546
Exploiting Concurrency in System-on-Chip Verification
547
Exploiting concurrency through knowledge of event propagation in cell rate ATM simulation
548
Exploiting Concurrency to Improve Latency and throughput in a Hybrid Storage System
549
Exploiting Concurrent GPU Operations for Efficient Work Stealing on Multi-GPUs
550
Exploiting concurrent kernel execution on graphic processing units
551
Exploiting conditional instructions in code generation for embedded VLIW processors
552
Exploiting Confusion Matrices for Relevance Ranking of Text Documents
553
Exploiting congestion information in network and higher layer protocols in multihop wireless ad hoc networks
554
Exploiting conjugate symmetry in power minimization based pre-processing for GPS: reduced complexity and smoothness
555
Exploiting Conjugate Symmetry of the Short-Time Fourier Spectrum for Speech Enhancement
556
Exploiting connection-holding time for an efficient dynamic traffic grooming
557
Exploiting connection-holding time to improve resource efficiency for dynamic provisioning in shared-path protection
558
Exploiting Connections Between MIMO MMSE Achievable Rate and MIMO Mutual Information
559
Exploiting Connectivity to Improve the Tangential Part of Geometry Prediction
560
Exploiting Constrained Rotation for Localization of Directional Sensor Networks
561
Exploiting Constraint Solving History to Construct Interaction Test Suites
562
Exploiting constraints during prioritized path planning for teams of mobile robots
563
Exploiting constraints to build a flexible and extensible data stream processing middleware
564
Exploiting Constructive Interference for Scalable Flooding in Wireless Networks
565
Exploiting constructive interference for scalable flooding in wireless networks
566
Exploiting Contact Spatial Dependency for Opportunistic Message Forwarding
567
Exploiting Content Similarity to Improve Memory Performance in Large-Scale High-Performance Computing Systems
568
Exploiting context for automatic check-in suggestion and validation
569
Exploiting Context in Location-Based Information Systems
570
Exploiting context information for estimating the performance of vehicular communications
571
Exploiting context information for V2X dissemination in vehicular networks
572
Exploiting Context Severity to Achieve Opportunistic Service Differentiation in Vehicular Ad hoc Networks
573
Exploiting Context-Awareness for Secure Spectrum Trading in Multi-Hop Cognitive Cellular Networks
574
Exploiting Context-Awareness in Augmented Reality Applications
575
Exploiting contexts with house log for value-added smart TV services
576
Exploiting contextual handover information for versatile services in NGN environments
577
Exploiting contextual independencies in Web search and user profiling
578
Exploiting contextual information for improved phoneme recognition
579
Exploiting contextual information for rank aggregation
580
Exploiting control management to accelerate Radix-4 FFT on a reconfigurable platform
581
Exploiting convexity in array antenna synthesis problems
582
Exploiting cooperation for delay optimization in cognitive networks
583
Exploiting Cooperative Advantages in Slotted ALOHA Random Access Networks
584
Exploiting Cooperative Diversity and Spatial Reuse in Multihop Cellular Networks
585
Exploiting cooperative diversity for wireless sensor networks using medium access control
586
Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks
587
Exploiting Cooperative Relay for Reliable Communications in Underwater Acoustic Sensor Networks
588
Exploiting Core Working Sets to Filter the L1 Cache with Random Sampling
589
Exploiting Correlated Attributes in Acquisitional Query Processing
590
Exploiting correlated discriminant features in time frequency and space for characterization and robust classification of image RSVP events with EEG data
591
Exploiting correlation among data items for cache replacement in Ad-hoc Networks
592
Exploiting Correlation and Parallelism of Materialized-View Recommendation for Distributed Data Warehouses
593
Exploiting correlation in neural signals for data compression
594
Exploiting correlation in stochastic circuit design
595
Exploiting correlation in target detection using MIMO radar with angular diversity
596
Exploiting Correlation Kernels for Ef£cient Handling of Intra-Die Spatial Correlation, with Application to Statistical Timing
597
Exploiting correlations among competing models with application to large vocabulary speech recognition
598
Exploiting correlations for efficient content-based sensor search
599
Exploiting COSMO-SkyMed spotlight SAR images for GMTI applications
600
Exploiting covariance-domain sparsity for dimensionality reduction
601
Exploiting CPU Bit Parallel Operations to Improve Efficiency in Search
602
Exploiting critical points to reduce positioning error for sensor-based navigation
603
Exploiting criticality to reduce bottlenecks in distributed uniprocessors
604
Exploiting cross ambiguity function properties for data compression in emitter location systems
605
Exploiting cross-channel quantizer error correlation in time-interleaved analog-to-digital converters
606
Exploiting cross-layer packet overhearing for opportunistic distributed STC in wireless relay networks
607
Exploiting cross-over distance to optimize energy in wireless sensor networks
608
Exploiting crosstalk pair-to-pair correlation in two-pair digital subscriber lines
609
Exploiting crosstalk to speed up on-chip buses
610
Exploiting CSP Techniques in Temporal Graphplan
611
Exploiting Cultural Heritage Documentation in Semantic Multimedia Annotations
612
Exploiting curse of diversity for improved network security
613
Exploiting curvature to compute the medial axis with Constrained Centroidal Voronoi Diagram on discrete data
614
Exploiting cyclic prefix for joint detection, decoding and channel estimation in OFDM via EM algorithm and message passing
615
Exploiting Cyclic Prefix for Performance Improvement in Single Carrier Systems
616
Exploiting Cyclic Prefix in Turbo FDE Systems Using Factor Graph
617
Exploiting cyclostationarity for range and bearing estimation
618
Exploiting cyclostationary subscriber-loop interference by equalization
619
Exploiting data and code interactions to reduce the power variance for CDMA sequences
620
Exploiting Data- and Thread-Level Parallelism for Image Correlation
621
Exploiting data coherence to improve parallel volume rendering
622
Exploiting data compression in collective I/O techniques
623
Exploiting Data Deduplication to Accelerate Live Virtual Machine Migration
624
Exploiting data diversity and multiuser diversity in noncooperative mobile infostation networks
625
Exploiting data flow information in algorithm-based fault tolerance
626
Exploiting data forwarding to reduce the power budget of VLIW embedded processors
627
Exploiting Data Fusion to Improve the Coverage of Wireless Sensor Networks
628
Exploiting data lineage for parallel optimization in extensible DBMSs
629
Exploiting Data Locality in FFT Using Indirect Swap Network on Cell/B.E.
630
Exploiting data mining techniques for broadcasting data in mobile computing environments
631
Exploiting Data Mining Techniques for Improving the Efficiency of a Supply Chain Management Agent
632
Exploiting data parallelism for efficient execution of logic programs with large knowledge bases
633
Exploiting Data Parallelism In Signal Processing On A Data Flow Machine
634
Exploiting data parallelism in vision on the Connection Machine system
635
Exploiting data preparation to enhance mining and knowledge discovery
636
Exploiting Data Representation for Fault Tolerance
637
Exploiting Data Semantics to Discover, Extract, and Model Web Sources
638
Exploiting Data Similarity to Reduce Memory Footprints
639
Exploiting Data Topology in Visualization and Clustering of Self-Organizing Maps
640
Exploiting data transfer locality in memory mapping
641
Exploiting database technology in the medical arena
642
Exploiting data-dependencies in ultra low-power DSP circuits
643
Exploiting Data-Dependent Slack Using Dynamic Multi-VDD to Minimize Energy Consumption in Datapath Circuits
644
Exploiting Data-Dependent Transmission Control and MAC Timing Information for Distributed Detection in Sensor Networks
645
Exploiting data-dependent transmission control and MAC timing information for distributed detection in sensor networks
646
Exploiting data-flow for fault-tolerance in a wide-area parallel system
647
Exploiting dataflow to extract Java instruction level parallelism on a tag-based multi-issue semi in-order (TMSI) processor
648
Exploiting dataflows and Petri nets mappings
649
Exploiting data-width locality to increase superscalar execution bandwidth
650
Exploiting day-ahead electricity price for maximized profit of photovoltaic systems
651
Exploiting dead value information
652
Exploiting deadline flexibility in Grid workflow rescheduling
653
Exploiting decentralized channel state information for random access
654
Exploiting Decoding Computational Locality to Improve the I/O Performance of an XOR-Coded Storage Cluster under Concurrent Failures
655
Exploiting deductive processes for automated network management
656
Exploiting deep neural networks for digital image compression
657
Exploiting deep parallel memory hierarchies for ray casting volume rendering
658
Exploiting defect clustering for yield and reliability prediction
659
Exploiting defect clustering to screen bare die for infant mortality failures: an experimental study
660
Exploiting degraded-service tolerance to improve performance of telecom networks
661
Exploiting delayed synchronization arrivals in light-weight data parallelism
662
Exploiting dependency relations for sentence level sentiment classification using SVM
663
Exploiting Depth Discontinuities for Vision-Based Fingerspelling Recognition
664
Exploiting depth information for efficient Multi-View Video Coding
665
Exploiting depth information for fast motion and disparity estimation in Multi-view Video Coding
666
Exploiting depth information for fast multi-view video coding
667
Exploiting design information to derive object distribution models
668
Exploiting developmental plasticity in Cartesian Genetic Programming
669
Exploiting device mismatch in neuromorphic VLSI systems to implement axonal delays
670
Exploiting Device-to-Device Communications in Joint Scheduling of Access and Backhaul for mmWave Small Cells
671
Exploiting DHCP server-side IP address conflict detection: A DHCP starvation attack
672
Exploiting DHT functionalities for pervasive network mobility
673
Exploiting dialogue act tagging and prosodic information for action item identification
674
Exploiting die-to-die thermal coupling in 3D IC placement
675
Exploiting Die-to-Die Thermal Coupling in 3-D IC Placement
676
Exploiting Different Cognition Levels of Channel Information in Transmission Scheduling of Two Sources Over Time Varying Wireless Channels
677
Exploiting differentiated filter configuration in fixed and flex-grid optical networks
678
Exploiting digital TV users´ preferences in a tourism recommender system based on semantic reasoning
679
Exploiting digital TV users´ preferences in a tourism recommender system based on semantic reasoning
680
Exploiting Digital Watermarking to Preserve Integrity of the Digital Holy Quran Images
681
Exploiting dimensionality reduction techniques for photovoltaic power forecasting
682
Exploiting Dimensions of the MIMO wireless channel: multidimensional link adaptation
683
Exploiting Directional Antennas for Reduced-Dimension Space–Time RAKE Receiving
684
Exploiting directional antennas to provide quality of service and multipoint delivery in mobile wireless networks
685
Exploiting directional dependencies of force perception for lossy haptic data reduction
686
Exploiting directionality for millimeter-wave wireless system improvement
687
Exploiting Disambiguation and Discrimination in Information Retrieval Systems
688
Exploiting discrete TOA randomization in local wireless communication networks
689
Exploiting discriminant and SVM constraints in NMF
690
Exploiting discriminant information in elastic graph matching
691
Exploiting discriminant information in nonnegative matrix factorization with application to frontal face verification
692
Exploiting disparity information for stereo image retrieval
693
Exploiting disparity information in visual object tracking
694
Exploiting distance based similarity in topic models for user intent detection
695
Exploiting distinguishing sensors in supervisory control of DES
696
Exploiting distributed and shared memory hierarchies with Hitmap
697
Exploiting distributed medical image database systems-general considerations and implementation experience
698
Exploiting Distributional Semantic Models in Question Answering
699
Exploiting diurnal user mobility for predicting cell transitions
700
Exploiting diverse observation perspectives to get insights on the malware landscape
701
Exploiting diversity and correlation to improve the performance of intrusion detection systems
702
Exploiting diversity for spoken term detection
703
Exploiting Diversity Gain in MIMO Equipped Ad hoc Networks
704
Exploiting diversity in multimode fiber communications links via multisegment detectors and equalization
705
Exploiting diversity of margin-based classifiers
706
Exploiting diversity of neural ensembles with speciated evolution
707
Exploiting Diversity Reception for Bluetooth Systems with IEEE802.11g Interference in Fading Channels
708
Exploiting diversity to enhance multimedia streaming over cellular links
709
Exploiting DMA for Performance and Energy Optimized STREAM on a DSP
710
Exploiting DMA to enable non-blocking execution in Decoupled Threaded Architecture
711
Exploiting DNS traffic to rank internet domains
712
Exploiting document feature interactions for efficient information fusion in high dimensional spaces
713
Exploiting Domain and Program Structure to Synthesize Efficient and Precise Data Flow Analyses (T)
714
Exploiting domain constraints for exemplar based bus detection for traffic scheduling
715
Exploiting domain knowledge for Object Discovery
716
Exploiting Domain Knowledge in IC Cell Layout
717
Exploiting domain knowledge in planning for uncertain robot systems modeled as POMDPs
718
Exploiting Domain Knowledge to Improve Biological Significance of Biclusters with Key Missing Genes
719
Exploiting Domain Symmetries in Reinforcement Learning with Continuous State and Action Spaces
720
Exploiting domain-specific knowledge to refine simulation specifications
721
Exploiting domain-specific properties: compiling parallel dynamic neural network algorithms into efficient code
722
Exploiting dominance and equivalence using fault tuples
723
Exploiting don´t cares during data sequencing using genetic algorithms
724
Exploiting don´t cares to enhance functional tests
725
Exploiting don´t cares to minimize *BMDs
726
Exploiting Doppler Blind Zone Information for Ground Moving Target Tracking with Bistatic Airborne Radar
727
Exploiting Doppler-diversity in flat, fast fading channels
728
Exploiting double opportunities for deadline based content propagation in wireless networks
729
Exploiting Downstream Mobility to Achieve Fast Upstream Message Propagation in Vehicular Ad Hoc Networks
730
Exploiting DRAM restore time variations in deep sub-micron scaling
731
Exploiting dual-antenna diversity for phase cancellation in augmented RFID system
732
Exploiting dual-polarization technique in weather radar for civil aircrafts to mitigate risk in adverse conditions
733
Exploiting duplication to minimize the execution times of parallel programs on message-passing systems
734
Exploiting dynamic aspects of visual perception for object recognition
735
Exploiting Dynamic Distributed Load Balance by Neighbor-Matching on P2P Grids
736
Exploiting Dynamic Information in IDEs Improves Speed and Correctness of Software Maintenance Tasks
737
Exploiting dynamic partial reconfiguration for on-line on-demand testing of permanent faults in reconfigurable systems
738
Exploiting dynamic phase distance mapping for phase-based tuning of embedded systems
739
Exploiting Dynamic Privacy in Socially Regularized Recommenders
740
Exploiting dynamic proxies in middleware for distributed, parallel, and mobile Java applications
741
Exploiting dynamic querying like flooding techniques in unstructured peer-to-peer networks
742
Exploiting Dynamic Reconfiguration for FPGA Based Network Intrusion Detection Systems
743
Exploiting dynamic reconfiguration of platform FPGAs: implementation issues
744
Exploiting dynamic reconfiguration techniques: the 2D-VLIW approach
745
Exploiting Dynamic Relays with Limited Overhead in Cellular Systems
746
Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
747
Exploiting dynamic source routing to enable undersea networking over an ad-hoc topology
748
Exploiting dynamic timing margins in microprocessors for frequency-over-scaling with instruction-based clock adjustment
749
Exploiting Dynamic Voltage and Frequency Scaling in networks on chip
750
Exploiting dynamic workload variation in low energy preemptive task scheduling
751
Exploiting Early Tag Access for Reducing L1 Data Cache Energy in Embedded Processors
752
Exploiting early time response using the fractional Fourier transform for analyzing transient radar returns
753
Exploiting early time response using the half Fourier transform (HFT) for parameter estimation
754
Exploiting Earth Observation data products for mapping Local Climate Zones
755
Exploiting earth observation in sustainable urban planning and management — The GEOURBAN project
756
Exploiting ECC redundancy to minimize crosstalk impact
757
Exploiting Ecore´s Reflexivity for Bootstrapping Domain-Specific Code-Generators
758
Exploiting edge capability for wireless sensor networking
759
Exploiting eDRAM bandwidth with data prefetching: simulation and measurements
760
Exploiting effects of parts in fine-grained categorization of vehicles
761
Exploiting Efficient and Scalable Shuffle Transfers in Future Data Center Networks
762
Exploiting efficient data mining techniques to enhance intrusion detection systems
763
Exploiting elastic energy storage for cyclic manipulation: Modeling, stability, and observations for dribbling
764
Exploiting electromagnetic fields to enhance the delivery of therapeutics to tumors
765
Exploiting electro-thermal resonance in high voltage power bipolar devices
766
Exploiting embedded FPGA in on-line software-based test strategies for microprocessor cores
767
Exploiting Emergence in On-Chip Interconnects
768
Exploiting emerging tools in short range wireless technologies
769
Exploiting End-Users Caching Capacities to Improve Content-centric Networking Delivery
770
Exploiting Enemy Weaknesses [Books]
771
Exploiting Energy Saving Opportunity of Barrier Operation in MPI Programs
772
Exploiting Energy-aware Spatial Correlation in Wireless Sensor Networks
773
Exploiting ensemble diversity for automatic feature extraction
774
Exploiting Ensemble Method in Semi-Supervised Learning
775
Exploiting Enterprise JavaBeans in the NIIIP virtual enterprise
776
Exploiting enterprise knowledge through domain analysis and frameworks: an experimental work
777
Exploiting Entire GSSK Antenna Combinations in MIMO Systems
778
Exploiting Environmental Information for Improved Underwater Target Classification in Sonar Imagery
779
Exploiting Environmental Properties for Wireless Localization and Location Aware Applications
780
Exploiting Equalization Techniques for Improving Data Rates in Organic Optoelectronic Devices for Visible Light Communications
781
Exploiting equivalence reduction and the sweep-line method for detecting terminal states
782
Exploiting error control approaches for Hardware Trojans on Network-on-Chip links
783
Exploiting Error Estimating Codes for Packet Length Adaptation in Low-Power Wireless Networks
784
Exploiting error estimating codes for packet length adaptation in wireless sensor networks
785
Exploiting error-control coding and cyclic-prefix in channel estimation for coded OFDM systems
786
Exploiting error-control coding and cyclic-prefix in channel estimation for coded OFDM systems
787
Exploiting error-control coding in blind channel estimation
788
Exploiting Error-Control Coding in Blind Channel Estimation
789
Exploiting error-correcting codes for cache minimum supply voltage reduction while maintaining coverage for radiation-induced soft errors
790
Exploiting e-SE for e-world systems
791
Exploiting Even Partition to Accelerate Structure Join
792
Exploiting event-driven metering to enable enhanced knowledge of electrical energy uses
793
Exploiting Event-Level Parallelism for Parallel Network Simulation on Multicore Systems
794
Exploiting Evolutionary Approaches for Content-Based Medical Image Retrieval
795
Exploiting excess capacity for improved robustness in optical WDM backbone mesh networks
796
Exploiting excess capacity for survivable traffic grooming in optical backbone networks
797
Exploiting Excess Capacity for Survivable Traffic Grooming in Optical WDM Backbone Networks
798
Exploiting Excess Capacity to Improve Robustness of WDM Mesh Networks
799
Exploiting Excess Capacity, Part II: Differentiated Services Under Traffic Growth
800
Exploiting excessive resources at data-centres of media content providers using cloud computing
801
Exploiting exchange bias length scales to fully tailor double-shifted hysteresis loops
802
Exploiting Execution Order and Parallelism from Processing Flow Applying Pipeline-Based Programming Method on Manycore Accelerators
803
Exploiting expendable process-margins in DRAMs for run-time performance optimization
804
Exploiting expertise through knowledge networks
805
Exploiting Explicit Annotations and Semantic Types for Implicit Argument Resolution
806
Exploiting External Data for Training a Cancer Clause Classifier
807
Exploiting external knowledge sources to improve kernel-based Word Sense Disambiguation
808
Exploiting eye-hand coordination: A novel approach to remote manipulation
809
Exploiting eye-head-arm coordination for the cognitive development of a baby humanoid
810
Exploiting faculty evaluation forms to improve teaching quality: An analytical review
811
Exploiting Fading Dynamics along with AMC for Energy-Efficient Transmission over Fading Channels
812
Exploiting False Discoveries -- Statistical Validation of Patterns and Quality Measures in Subgroup Discovery
813
Exploiting fast carry-chains of FPGAs for designing compressor trees
814
Exploiting faster-than-Nyquist signaling
815
Exploiting Fault Model Correlations to Accelerate SEU Sensitivity Assessment
816
Exploiting Fault Tolerance Towards Power Efficient Wireless Multimedia Applications
817
Exploiting fault tolerance within cache memory structures
818
Exploiting FDDI communication features to connect FieldBuses in process control environment
819
Exploiting feature correspondence constraints for image recognition
820
Exploiting feature dynamics for active object recognition
821
Exploiting Feature Hierarchies with Convolutional Neural Networks for Cultural Event Recognition
822
Exploiting feature relationships towards stable feature selection
823
Exploiting Feature Selection Algorithm on Group Events Data Based on News Data
824
Exploiting features from triangle geometry for digit recognition
825
Exploiting femtocellular networks for emergency telemedicine applications in indoor environments
826
Exploiting fibre optics transmission capacity: 4-quadrature multilevel signalling
827
Exploiting field intensity and signal filtering in imaging through random cloud-like media with short pulses
828
Exploiting Filter Stopband for Radio Frequency Interferometer Operation
829
Exploiting fine- and coarse-grain parallelism in embedded programs
830
Exploiting fine-grain thread level parallelism on the MIT multi-ALU processor
831
Exploiting Fine-Grained Data Parallelism with Chip Multiprocessors and Fast Barriers
832
Exploiting fine-grained explicit router feedback towards high-performance transport protocols
833
Exploiting fine-grained idle periods in networks of workstations
834
Exploiting fine-grained parallelism through a combination of hardware and software techniques
835
Exploiting Fine-Grained Pipeline Parallelism for Wavefront Computations on Multicore Platforms
836
Exploiting Fingerprint Prefetching to Improve the Performance of Data Deduplication
837
Exploiting finite precision information to guide data-flow mapping
838
Exploiting Finite-state Automation for HCI evaluation
839
Exploiting Fisher Kernels in Decoding Severely Noisy Document Images
840
Exploiting Fixed Programs in Embedded Systems: A Loop Cache Example
841
Exploiting flash memory for reducing disk power consumption in portable media players
842
Exploiting force feedback in pilot training and control of an underwater robotics vehicle: an implementation in LabVIEW
843
Exploiting formal bayesian framework for data fusion in multi-sensor systems
844
Exploiting forwarding to improve data bandwidth of instruction-set extensions
845
Exploiting Fountain Codes for Secure Wireless Delivery
846
Exploiting Foursquare and Cellular Data to Infer User Activity in Urban Environments
847
Exploiting foveation in user-centred image fusion
848
Exploiting FPGA block memories for protected cryptographic implementations
849
Exploiting FPGA for accelerating fault injection experiments
850
Exploiting FPGA I/O for cheaper PCBS
851
Exploiting FPGA-aware merging of custom instructions for runtime reconfiguration
852
Exploiting FPGA-based architectures and design tools for problems of reconfigurable computations
853
Exploiting FPGA-based techniques for fault injection campaigns on VLSI circuits
854
Exploiting FPGAs for technology-aware system-level evaluation of multi-core architectures
855
Exploiting fractalness of error surfaces: New methods for neural network learning
856
Exploiting frame coherence with the temporal depth buffer in a distributed computing environment
857
Exploiting frame length of 802.15.4g signals for wake-up control in sensor networks
858
Exploiting frame-to-frame coherence for accelerating high-quality volume raycasting on graphics hardware
859
Exploiting frame-to-frame coherence in a virtual reality system
860
Exploiting Free LUT Entries to Mitigate Soft Errors in SRAM-based FPGAs
861
Exploiting free silicon for energy-efficient computing directly in NAND flash-based solid-state storage systems
862
Exploiting free vibration of an elastic beam for stable running locomotion
863
Exploiting frequency and spatial dimensions in small cell wireless networks
864
Exploiting frequency correlation in LTE to reduce HARQ memory
865
Exploiting frequency diverse array processing to improve SAR image resolution
866
Exploiting frequency diversity in SDM/STBC multicarrier systems
867
Exploiting Frequency Groups for Broadcasting in Multi-channel Multi-radio Networks
868
Exploiting frequency-selectivity in real-time multicast services over LTE networks
869
Exploiting Frequent Episodes in Weighted Suffix Tree to Improve Intrusion Detection System
870
Exploiting FRI signal structure for sub-Nyquist sampling and processing in medical ultrasound
871
Exploiting Friendship Relations for Efficient Routing in Mobile Social Networks
872
Exploiting full duplex for device-to-device communications in heterogeneous networks
873
Exploiting full Duplex techniques for secure communication in SWIPT system
874
Exploiting full-waveform lidar data and multiresolution wavelet analysis for vertical object detection and recognition
875
Exploiting fullwaveform lidar signals to estimate timber volume and above-ground biomass of individual trees
876
Exploiting functional decomposition for efficient parallel processing of multiple data analysis queries
877
Exploiting functional dependencies in finite state machine verification
878
Exploiting fundamental properties of SAR data for compression of tactical SAR imagery
879
Exploiting fuzzy approximator to head pose estimation
880
Exploiting Fuzzy Ordering Relations to Preserve Interpretability in Context Adaptation of Fuzzy Systems
881
Exploiting fuzzy reasoning optimized by Particle Swarm Optimization and adaptive thresholding to diagnose multiple faults in dynamic hybrid systems
882
Exploiting Gaps in Fixed-Priority Preemptive Schedules for Task Insertion
883
Exploiting Gaps of Real-Time Traffic to Improve Handover Performance in Wireless Networks
884
Exploiting gastrointestinal anatomy for organ classification in capsule endoscopy using locality preserving projections
885
Exploiting Gate Leakage in Deep-Submicrometer CMOS for Input Offset Adaptation
886
Exploiting gaze movements for automatic video annotation
887
Exploiting Gene Regulatory Networks for Robust Wireless Sensor Networking
888
Exploiting general knowledge in user-dependent fusion strategies for multimodal biometric verification
889
Exploiting genre for music emotion classification
890
Exploiting Geo Distributed datacenters of a cloud for load balancing
891
Exploiting Geo-Distributed Clouds for a E-Health Monitoring System With Minimum Service Delay and Privacy Preservation
892
Exploiting geographic opportunistic routing for soft QoS provisioning in wireless sensor networks
893
Exploiting geographic spread (GS) for wide-area asynchronous transfer mode (ATM) dynamic multipoint routing
894
Exploiting Geographical and Temporal Locality to Boost Search Efficiency in Peer-to-Peer Systems
895
Exploiting Geometric Partitioning in Task Mapping for Parallel Computers
896
Exploiting Geometric Restrictions in a PTZ Camera for Finding Point-orrespondences Between Configurations
897
Exploiting geometric translations in bearings-only TLS tracking
898
Exploiting geometric translations in TLS based robot localization from landmark bearings
899
Exploiting Geometrical Properties on Protein Similarity Search
900
Exploiting ghost-FSMs as a BIST structure for sequential machines
901
Exploiting Gigabit Ethernet capacity for cluster applications
902
Exploiting global and local decisions for multimodal biometrics verification
903
Exploiting global and local information for image quality assessment with contrast change
904
Exploiting global causality in testing of distributed and component-based applications
905
Exploiting global connectivity constraints for reconstruction of 3D line segments from images
906
Exploiting global data locality in non-blocking multithreaded architectures
907
Exploiting global features for tempo octave correction
908
Exploiting global force torque measurements for local compliance estimation in tactile arrays
909
Exploiting Global Input Output Access Pattern Classification
910
Exploiting global knowledge to achieve self-tuned congestion control for k-ary n-cube networks
911
Exploiting global priors for RGB-D saliency detection
912
Exploiting global structure for performance on clusters
913
Exploiting GNSS signal structure to enhance observability
914
Exploiting GNSS signals for soil moisture and vegetation biomass retrieval
915
Exploiting GNU radio and USRP: An economical test bed for real time communication systems
916
Exploiting GoP patterns for video traffic control over wireless networks
917
Exploiting Gossip for Self-Management in Scalable Event Notification Systems
918
Exploiting GPU architectures for dynamic invariant mining
919
Exploiting GPU On-chip Shared Memory for Accelerating Schedulability Analysis
920
Exploiting GPUDirect RDMA in Designing High Performance OpenSHMEM for NVIDIA GPU Clusters
921
Exploiting GPUs for compute-intensive medical applications
922
Exploiting GPUs for multi-agent path planning on grid maps
923
Exploiting GPUs for visuo-haptic modelling of deformable tissues
924
Exploiting GPUs to Simulate Complex Systems
925
Exploiting gradient histograms for gait-based person identification
926
Exploiting grammatical dependencies for fine-grained opinion mining
927
Exploiting graph compression techniques for coding and monitoring of networks
928
Exploiting graph embedding in support vector machines
929
Exploiting Graphic Card Processor Technology to Accelerate Data Mining Queries in SAP NetWeaver BIA
930
Exploiting graphic processing units parallelism to improve intelligent data acquisition system performance in JET´s correlation reflectometer
931
Exploiting Graphic Processing Units Parallelism to Improve Intelligent Data Acquisition System Performance in JET´s Correlation Reflectometer
932
Exploiting graphics processors for high-performance IP lookup in software routers
933
Exploiting grid computation for solving the Vehicle Routing Problem
934
Exploiting ground plane constraints for visual-inertial navigation
935
Exploiting Ground-Penetrating Radar Phenomenology in a Context-Dependent Framework for Landmine Detection and Discrimination
936
Exploiting group communication for reliable high volume data distribution
937
Exploiting group recommendation functions for flexible preferences
938
Exploiting group sparsity in SAR tomography
939
Exploiting group structure to improve retrieval accuracy and speed in image databases
940
Exploiting group symmetries to improve precision in kinodynamic and nonholonomic planning
941
Exploiting H~~ Sampled-Data Control Theory for High-Precision Electromechanical Servo Control Design
942
Exploiting Hadoop Topology in Virtualized Environments
943
Exploiting hand kinematic synergies and wearable under-sensing for hand functional grasp recognition
944
Exploiting hardware abstraction for hybrid parallel computing framework
945
Exploiting hardware advances for software testing and debugging: NIER track
946
Exploiting Hardware and Software Low power Techniques for Energy Efficient Co-Scheduling in Dynamically Reconfigurable Systems
947
Exploiting Hardware Performance Counters
948
Exploiting hardware reconfigurability on window join
949
Exploiting hardware sharing in high-level synthesis for partial scan optimization
950
Exploiting hardware transactional memory in main-memory databases
951
Exploiting harmonic periods to improve linearly approximated response-time upper bounds
952
Exploiting harmonic structures to improve separating simultaneous speech in under-determined conditions
953
Exploiting hashtags for adaptive microblog crawling
954
Exploiting heap symmetries in explicit-state model checking of software
955
Exploiting Heavy-Tailed Statistics for Predictable QoS Routing in Ad Hoc Wireless Networks
956
Exploiting Heterogeneity for Collective Data Downloading in Volunteer-based Networks
957
Exploiting Heterogeneity for Energy Efficiency in Chip Multiprocessors
958
Exploiting Heterogeneity for Sensor Network Security
959
Exploiting Heterogeneity in Cache Hierarchy in Dark-Silicon 3D Chip Multi-processors
960
Exploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach
961
Exploiting Heterogeneity in P2P Video Streaming
962
Exploiting heterogeneity in sensor networks
963
Exploiting Heterogeneity of Nodes to Enhance Search Performance in Large-Scale Peer-to-Peer Network
964
Exploiting Heterogeneity to Prolong the Lifetime of Large-Scale Wireless Sensor Networks
965
Exploiting Heterogeneity Wireless Channels for Opportunistic Routing in Dynamic Spectrum Access Networks
966
Exploiting Heterogeneous Human Mobility Patterns for Intelligent Bus Routing
967
Exploiting Hetero-Junctions to Improve the Performance of III–V Nanowire Tunnel-FETs
968
Exploiting HF ambient noise to synchronize distributed receivers
969
Exploiting HHPC for parallel discrete event simulation
970
Exploiting hidden block sparsity: Interdependent matching pursuit for cyclic feature detection
971
Exploiting Hidden Convexity For Flexible And Robust Resource Allocation In Cellular Networks
972
Exploiting hidden Markov models in identifying passive UHF RFID tags
973
Exploiting hidden pilots for carrier frequency offset estimation for generalized MC-CDMA systems
974
Exploiting Hidden Power-Feedback Loops for Cognitive Radio
975
Exploiting hierarchical context on a large database of object categories
976
Exploiting hierarchical CP-nets to increase the reliability of Web services workflow
977
Exploiting Hierarchical Discourse Structure for Review Sentiment Analysis
978
Exploiting hierarchical encodings of equality to design independent strategies in parallel SMT decision procedures for a logic of equality
979
Exploiting hierarchical global views for query reformulation
980
Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information
981
Exploiting Hierarchical Parallelism Using UPC
982
Exploiting hierarchy and structure to efficiently solve graph coloring as SAT
983
Exploiting hierarchy for multiple error correction in combinational circuits
984
Exploiting hierarchy in a cache-based switch-level simulator
985
Exploiting hierarchy in heterogeneous environments
986
Exploiting hierarchy in parallel computer networks to optimize collective operation performance
987
Exploiting hierarchy in structural brain networks
988
Exploiting High Dimensional Video Features Using Layered Gaussian Mixture Models
989
Exploiting High Level Scene Cues in Stereo Reconstruction
990
Exploiting high-level descriptions for circuits fault tolerance assessments
991
Exploiting high-performance DSP hardware for real-time CELP implementation
992
Exploiting high-speed sequences for background subtraction
993
Exploiting Historical Spectrum Occupancy Information for Adaptive Spectrum Sensing
994
Exploiting history to reduce interaction costs in collaborative analysis
995
Exploiting Homogeneous Dual Polarity Routes in Implementation of Algorithms for Optimization of Galois Field Expressions for Ternary Functions
996
Exploiting Homologies in Global Calibration of a Multi-imager Array
997
Exploiting homophily-based implicit social network to improve recommendation performance
998
Exploiting hop diversity with frequency sharing in multi-hop OFDM networks
999
Exploiting hopping pilots for parametric channel estimation in OFDM systems
1000
Exploiting Host Name Locality for Reduced Stretch P2P Routing
بازگشت